Article posted: Jun 21, 2017

By Joakim Thorén, CEO

It seems lately that more countries are turning to biometrics to ensure the safety of their borders. This January, Australia vowed it will replace passports as a means of identifying passengers after installing the latest biometric identification platforms, such as facial, iris or fingerprint recognition systems by 2020.

Continue Reading...

Article posted: Jun 07, 2017

By Joakim Thoren, CEO

It's no surprise that as the numbers of places where voters can make their election choices electronically increase so, too, do concerns around security, reliability, privacy and safety. But when you're in our business, you know that the technology certainly exists to ensure electronic voting addresses every one of those concerns.

Continue Reading...

Article posted: Dec 13, 2016

By Joakim Thoren, CEO

Our late fall 2016 global survey of IT and cybersecurity professionals has turned up some interesting trends for 2017, not the least of which is that more and more companies are and will be using multi-factor authentication to secure their data.

Continue Reading...

Article posted: Dec 06, 2016

By The Versasec Team

Do you need helping explaining what a smart card management system is to customers, employees, partners or the board of directors? Check out Versasec's latest video, "Smart Card Introduction", explaining why smart cards are a secure solution for identity and access management, and how they work to protect your organization's data assets.

Continue Reading...

Article posted: Jun 27, 2016

We're partnering with Yubico, the leading provider of simple and open online identity protection, and announcing support for their YubiKey USB hardware device in Versasec's next product update. Stay tuned for a new vSEC:CMS announcement end of June.

Continue Reading...

Article posted: Oct 08, 2015

By Paul Foley, Professional Services Director and Co-Founder

In part one of this blog, I highlighted the pitfalls of single-factor authentication, using the example of a company being attacked by a disgruntled employee. In that scenario, unhappy Mallory uses the Windows Recovery Tool to find the network credentials of co-workers with whom she shares a workstation. Her intentions are not good.

Continue Reading...

Article posted: Oct 01, 2015

By Paul Foley, Professional Services Director and Co-Founder

Internal IT attacks - now recognized as one of the most prominent threats to corporate data - occur when an individual or group within an organization seeks to disrupt operations or exploit operational assets. And in many companies, it's shockingly simple to do. There are many high-profile cases, perhaps most prominently the Edward Snowden Case, where personal login credentials were stolen from his NSA coworkers so he could access classified information. The Snowden case and others like it demonstrate the need for this vulnerability to be addressed.

Continue Reading...